beautypg.com

Replicating security configurations – Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual

Page 603

background image

Brocade Network Advisor SAN + IP User Manual

541

53-1002949-01

Configuration repository management

14

Replicating security configurations

NOTE

This feature requires a Trial or Licensed version.

You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.

Select Configure > Configuration > Replicate > Security.

A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:

1. Overview, which describes the wizard.

2. Configuration Type, which allows you to select the type of configuration you wish to replicate.

For more information about the fields and components of this step, refer to

Table 65

on

page 541.

3. Select Source Switch, which allows you to select the source device of the security policy

configuration you wish to replicate. For more information about the fields and components of
this step, refer to

Table 66

on page 541.

4. Select Destination Switches, which allows you to select the destination devices. Only devices

that can accept the selected security policy configuration display. For more information about
the fields and components of this step, refer to

Table 67

on page 542.

5. Validation, which lists the configuration settings that you can validate before you replicate. For

more information about the fields and components of this step, refer to

Table 68

on page 543.

6. Summary, which lists the replication settings that successfully ran on all the selected

destination switches. For more information about the fields and components of this step, refer
to

Table 69

on page 543.

To proceed to the next step in the wizard, click Next. To return to the previous screen, click Previous.

TABLE 65

Step 2. Configuration Type

Field/Component

Description

AD/LDAP Server option

Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.

DCC Policy option

Select to replicate the Device Connection Control (DCC) security policy.

IP Policy option

Select to replicate the Internet Protocol (IP) Filter security policy.

RADIUS Server option

Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.

SCC Policy option

Select to replicate the Switch Connections Control (SCC) security policy.

TABLE 66

Step 3. Select Source Switch

Field/Component

Description

Available Switches table

Lists the devices from which you can select to replicate a security policy

Fabric Name

The name of the fabric that is associated with the selected available
switch.

Switch Name

The name of the source switch to be replicated.